Skip to main content

CVE-2024-21357: CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2024-21357cvecve-2024-21357cwe-843
Published: Tue Feb 13 2024 (02/13/2024, 18:02:13 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability

AI-Powered Analysis

AILast updated: 06/26/2025, 08:21:10 UTC

Technical Analysis

CVE-2024-21357 is a high-severity remote code execution vulnerability affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability arises from a type confusion flaw (CWE-843) in the Windows Pragmatic General Multicast (PGM) protocol implementation. Type confusion occurs when a program accesses a resource using an incompatible type, leading to unexpected behavior. In this case, an attacker can exploit this flaw remotely without requiring authentication or user interaction, by sending specially crafted network packets to a vulnerable system's PGM service. Successful exploitation could allow the attacker to execute arbitrary code with system-level privileges, compromising confidentiality, integrity, and availability of the affected system. The CVSS 3.1 base score is 8.1, indicating high severity, with the vector string AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H, meaning the attack is network-based but requires high attack complexity, no privileges, and no user interaction. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to its potential impact and the critical nature of remote code execution flaws. The lack of available patches at the time of publication increases exposure for affected systems. This vulnerability specifically targets Windows 10 Version 1809, which is an older but still in-use version in some environments, particularly in legacy or industrial systems. The PGM protocol is used for reliable multicast communication, which is less common in typical enterprise environments but may be present in specialized network configurations or legacy applications.

Potential Impact

For European organizations, the impact of CVE-2024-21357 could be substantial, especially for those still operating Windows 10 Version 1809 in production environments. Successful exploitation could lead to full system compromise, enabling attackers to steal sensitive data, disrupt operations, or deploy ransomware and other malware. Critical infrastructure sectors such as manufacturing, energy, and transportation that rely on legacy Windows 10 systems and multicast networking could be particularly vulnerable. The confidentiality, integrity, and availability of affected systems would be at high risk, potentially causing operational downtime and financial losses. Additionally, organizations in regulated industries (e.g., finance, healthcare) could face compliance violations if exploited. The high attack complexity somewhat reduces the likelihood of widespread exploitation, but targeted attacks against high-value assets remain a concern. The absence of known exploits in the wild currently provides a window for mitigation before active exploitation emerges.

Mitigation Recommendations

European organizations should prioritize identifying and inventorying all systems running Windows 10 Version 1809, especially those using multicast networking features like PGM. Given the lack of an official patch at the time of this report, organizations should implement network-level mitigations such as blocking or filtering PGM traffic at firewalls and network segmentation to limit exposure. Disabling the PGM protocol or related services on systems where it is not required can reduce the attack surface. Monitoring network traffic for anomalous multicast packets may help detect exploitation attempts. Organizations should also plan to upgrade affected systems to a supported Windows version with security updates. Applying security best practices such as least privilege, endpoint detection and response (EDR) solutions, and regular vulnerability scanning will further reduce risk. Close coordination with Microsoft for patch availability and applying updates promptly once released is critical. Incident response teams should prepare for potential exploitation scenarios given the high impact of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-12-08T22:45:20.447Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9836c4522896dcbeab36

Added to database: 5/21/2025, 9:09:10 AM

Last enriched: 6/26/2025, 8:21:10 AM

Last updated: 7/30/2025, 11:17:10 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats